Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mj87-hwqh-73pj | python-multipart affected by Denial of Service via large multipart preamble or epilogue data |
Fri, 24 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastapiexpert
Fastapiexpert python-multipart |
|
| CPEs | cpe:2.3:a:fastapiexpert:python-multipart:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Fastapiexpert
Fastapiexpert python-multipart |
Tue, 21 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1050 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 20 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 18 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kludex
Kludex python-multipart |
|
| Vendors & Products |
Kludex
Kludex python-multipart |
Sat, 18 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Python-Multipart is a streaming multipart parser for Python. Versions prior to 0.0.26 have a denial of service vulnerability when parsing crafted `multipart/form-data` requests with large preamble or epilogue sections. Upgrade to version 0.0.26 or later, which skips ahead to the next boundary candidate when processing leading CR/LF data and immediately discards epilogue data after the closing boundary. | |
| Title | Python-Multipart affected by Denial of Service via large multipart preamble or epilogue data | |
| Weaknesses | CWE-400 CWE-834 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T15:46:40.011Z
Reserved: 2026-04-10T22:50:01.358Z
Link: CVE-2026-40347
Updated: 2026-04-20T15:46:27.078Z
Status : Analyzed
Published: 2026-04-18T00:16:38.520
Modified: 2026-04-24T16:51:19.917
Link: CVE-2026-40347
OpenCVE Enrichment
Updated: 2026-04-21T16:00:13Z
Github GHSA